:)
Ryuk Hack Highlights the Need for Better Secure Remote Access
Jun08

Ryuk Hack Highlights the Need for Better Secure Remote Access

Ryuk Hack Highlights the Need for Better Secure Remote Access Source – forbes.com Recently, a research institute lost a week’s work of valuable research data on COVID-19 due to a security incident. One of the main enablers of the attack was poor remote access security. This incident may have been averted if a solution like the cloud-based remote access VPN built into secure access service edge (SASE) were in place instead....

Read More
3 Ways to Protect Your Information Online
Apr14

3 Ways to Protect Your Information Online

3 Ways to Protect Your Information Online Source – BBC.com In an increasingly digital world, the methods of identity and monetary theft have increased, and become more sophisticated. It’s unrealistic to expect that we become unknown, scrubbing our presence online completely–this is simply unfeasible. Employers need to be able to see that you have an online presence in order to ensure that you aren’t a liability or cause an...

Read More
Why IoT Devices Are the Optimal Targets for DDoS Attackers
Mar16

Why IoT Devices Are the Optimal Targets for DDoS Attackers

Why IoT Devices Are the Optimal Targets for DDoS Attackers Source – BBC.com Did you know that your new smartwatch could easily take part in a DDoS attack without you ever knowing? In fact, any of your IoT devices could easily share the same fate if you don’t make the effort to protect them. After all, their built-in defenses are extremely weak. After hijacking yours and millions of other devices, the hacker will either...

Read More
DDoS is changing: How ransom-based DDoS attacks are gaining momentum
Jan29

DDoS is changing: How ransom-based DDoS attacks are gaining momentum

DDoS is changing: How ransom-based DDoS attacks are gaining momentum Source – BBC.com DDoS attacks can be extremely damaging. Short for Distributed Denial of Service attacks, DDoS attacks seek to knock websites or other internet services offline by bombarding them with massive amounts of fraudulent traffic. This overwhelms them to the point that they are unable to let through legitimate traffic from genuine users. DDoS attacks...

Read More
How Do Cybercriminals Hack Your Password?
Jan27

How Do Cybercriminals Hack Your Password?

How Do Cybercriminals Hack Your Password? Source – BBC.com The ultimate goal of most petty hackers is to steal your money. If they break into your bank accounts, PayPal, or investment pages, they can do some severe financial damage. Likewise, if they break into the email account associated with your monetary accounts, they can take control of your critical passwords. Weak Cryptography It’s essential for you to avoid weak...

Read More
SolarWinds Hackers Breached Malwarebytes Emails
Jan20

SolarWinds Hackers Breached Malwarebytes Emails

But Malwarebytes said that the hack isn’t related to the SolarWinds incident.  https://blog.malwarebytes.com/malwarebytes-news/2018/01/important-web-blocking-ram-usage/ Malwarebytes, as the name suggests, is security software that protects your computer from malware. It has been around for many years and it has millions of users around the world.  It’s safe to use. But its security technology may not be enough.  On...

Read More